Information Gathering with NMAP

Post Image
Welcome to my third tutorial on Information Gathering

In this tutorial we ll be use NMAP to gather Open Ports information about our target.

So first let us start with some basics of NMAP.

Using NMAP you can check the open ports and services versions running on a server that may help you to get direct access exploiting any of the functionality or via bruteforcing. It also helps you to understand about the services running on the server so that later it may help you while pentesting.

The two basic scan types used most in Nmap are TCP connect() scanning [-sT] and SYN scanning (also known as half-open, or stealth scanning) [-sS].

For a basic port scan:
Nmap <IP Address>



For a Stealth port scan:
Nmap -sS <IP Address>

To scan the service version running on Open Ports use -sV switch
Nmap -sV <IP Address>

Some times if a server is blocking your ping and acting dead then you can use -Pn switch to scan it
Nmap -sV -Pn <IP Address>

For a OS detection you can use -O switch

Nmap -O -Pn <IP Address>

Thats all for this tutorial see you in the next tutorial, keep rocking, and keep hacking.
Newer post

DNS Information Gathering

DNS Information Gathering
Information Gathering with Google
Older post

Information Gathering with Google